SECURE HARDWARE BASE

Hardware- and software-based security protects the full stack and guarantees trust for your critical workloads running with ARCA Trusted OS.

Hardware-based security sets the root of trust of the system into a physical device (TPM), provides increased authenticity and verifiability against rogue OS, and is tamper evident.

UEFI FIRMWARE

UEFI used for secure boot of CYSEC ARCA

TPM 2.0

TPM decrypts data and partition systems when a trusted kernel is booted

AMD-SEV

A CPU with secure enclave; enables confidential computing

CERTIFIED CRYPTOGRAPHIC BACKEND

HSM/SE; FIPS-140-2 L3 HSM

SECURE ROOT OF TRUST

SE integrates Common Criteria EAL4 and certified root of trust

HARDENED KERNEL

Any interference leads to kernel lockdown

CASE STUDIES

Geosatis, IoT
electronic monitoring

Geosatis used CYSEC ARCA to meet hardware security module and key management requirements for a new, more secure product line.

Learn more >

METACO,
the fintech leader

METACO deployed CYSEC ARCA trusted OS, to provide the secure hardware that would protect high-value client data.

Learn more >

LATEST INDUSTRY NEWS

STAY INFORMED